Category: Computer Security

Computer security, also called cybernetics, is the protection of computer systems and information from harm, theft and unauthorized use. Computer hardware is typically protected by the same means used to protect other valuable or sensitive equipment—namely, serial numbers, doors and locks and alarms. The protection of information and system access is done using other tactic, some quite complex.

The New Service Corporation for International Development

It is hard to tell if the recent consolidation into a single provider is in the context of a more universal effort to simplify the relationship between the individual and the larger system. In the case of the nonprofit, the consolidation is more of an effort to reduce administrative cost while at the same time…

Read More

Satellite-Based Broadband Inc

This article was authored by James C. Houghton, Jr. , the founder and former CEO of Satellite-Based Broadband Inc. , a provider of satellite broadband infrastructure, and Christopher B. Houghton, the former President of Satellite-Based Broadband Inc. The article analyzes the recent court ruling on a class action lawsuit against SBA in U. District Court…

Read More

Samsung Electronics and LG Electronics Q2 Results

Samsung Electronics (00:00:09) The second quarter earnings announcements were made by many of the companies on the Q2 news segment. There were no earnings announcements from LG Electronics. Below is a list of the Q2 results of Samsung Electronics and LG Electronics which will be included in the earnings releases. In Q1 2020, the world’s…

Read More

The Latest Computer Security Techniques Applying to Ice Skating

Click the above title to view this paper’s abstract. The paper is an example of the latest computer security techniques applied to the ice skaters’ family pass system. This paper describes the design of a computer security system which would allow the use of an approved family pass. The system was designed to require that…

Read More

Anwar Soussa As Managing Director of Safaricom’s Ethiopian Unit

Anwar Soussa was the deputy director-general of the military police at the U. military police headquarters, during the period between 2004 and 2007. Soussa, who was based in London, became the director general of the Ethiopian army in January 2007, when the group was formally formed. He, along with Brig. Yemayo, appointed in March 2005…

Read More

The U S Regulators Investigate the Monopoly Problem

The case of Broadcom Corp. Qualcomm Inc. (2014) provides one of the largest examples of the problems inherent in the abuse of monopoly power. Broadcom made a public claim for antitrust violations in order to pressure Qualcomm into giving its software patents to Broadcom, which in turn, forced out Qualcomm co-founder and CEO Andy Rubin…

Read More

KUB – A Public Fiber Broadband Network for the Knoxville Utilities Board

From the day KUB was launched in April 2012 all hell has been unleashed upon its owners and its critics. By now I’ve come to the end of the last batch of articles that I plan to write on KUB. Now, here’s the thing: this is not a bad thing. There’s a certain point at…

Read More

China Issues Search Warrants for American Companies

China has issued a search warrant for American companies which has led the United States to issue arrest warrants against their executives and employees. A document with the search warrants is being released to the public today, and the latest of which will ask the Chinese government to “investigate and identify” an unknown cybersecurity firm…

Read More

Julian Assange and WikiLeaks

The Guardian has been reporting for years that the U. prosecutors have been fabricating evidence against Julian Assange since at least 2012. This is the latest installment in a very long saga of U. persecution of the WikiLeaks founder. The first major allegation of “fabrication” against Assange and WikiLeaks began in August 2012, when U.…

Read More

Threat Detection Tools – Understanding Threat Detection Tools

There is ample evidence that organizations are increasingly adopting endpoint security. Organizations that do not manage endpoints or security environments well have a tendency to be hit by security incidents that occur in both the physical and virtual environments. In the past, cyber attackers focused exclusively on attacking organizations such as banks, government agencies or…

Read More